Systems and methods for verifying identities in transactions
First Claim
1. A computerized method of verifying the identity of an attendant operating a money transfer transaction device, comprising:
- receiving at the money transfer transaction device a user identification and password from the attendant;
receiving at the money transfer transaction device additional information from the attendant, wherein the additional information relates to a security feature that limits access to the transaction device; and
using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction.
2 Assignments
0 Petitions
Accused Products
Abstract
A computerized method of verifying the identity of an attendant operating a money transfer transaction device includes receiving at the money transfer transaction device a user identification and password from the attendant and receiving at the money transfer transaction device additional information from the attendant. The additional information relates to a security feature that limits access to the transaction device. The method also includes using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction.
-
Citations
30 Claims
-
1. A computerized method of verifying the identity of an attendant operating a money transfer transaction device, comprising:
-
receiving at the money transfer transaction device a user identification and password from the attendant;
receiving at the money transfer transaction device additional information from the attendant, wherein the additional information relates to a security feature that limits access to the transaction device; and
using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of obtaining identification information from an individual involved in a transaction, comprising:
-
entering transaction-related information into a transaction processing device, including information relating to the identity of the individual;
receiving a prompt via the transaction processing device to enter identification information;
entering identification information, wherein the identification information verifies the information relating to the identity of the individual; and
processing the transaction. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A system for obtaining identification information from an operator of a transaction processing device, comprising:
-
a host computer system; and
a transaction processing device that is programmed to;
receive a user identification and password from the operator;
receive additional information from the operator, wherein the additional information relates to a security feature that limits access to the transaction device; and
transmit at least a portion of the information to the host computer system;
wherein the host computer system is programmed to use the additional information, the user identification, and the password to evaluate whether to allow the operator to operate the transaction device to process a transaction.
-
-
28. A system for obtaining identification information from a party to a transaction, comprising:
-
a host computer system; and
a transaction processing device programmed to;
receive transaction-related information, including information relating to the identity of the party;
receive identification information from the party, wherein the identification information relates to a biometric feature of the party; and
transmit at least a portion of the information to a host computer system. - View Dependent Claims (29, 30)
-
Specification